==Phrack Magazine==
Volume Four, Issue Forty-Three, File 7 of 27
CONFERENCE NEWS
PART I
****************************************************************************
The Missouri Programmers' Convention Transcripts
Compiled by Synapse 403
For those of you who were at the con, or moreover were at the con
and can remember it (Sir Lance?), these transcripts are for you.
They are not absolute in their accuracy and are most likely full
of holes, however please keep in mind they are the transcribed
product of a hacker who is suffering from a hangover of heroic
proportions, and is typing to keep his mind off the mutiny
happening in his stomach.
Please note that within the transcripts you will find parts of
the speaker's words paraphrased, this is not intended to
misrepresent them, this is simply an easy way to cut to the chase
and get this job done. Another note to make is that with in this
transcript, several people have been labeled unknown, this is
either due to I could not see their face while they were speaking
or they wished to remain anonymous. These folks will be labeled
"unknown" keep in mind that this is for the above reasons and not
any slight, or K-RaD At|T|_|D3.
SummerCon
Introductions on camera were the essential beginning of the
meeting, with Drunkfux wandering counter clockwise through the
room, pointing the camera (that he was clinically joined with),
in your face and asking your name and to say a bit about yourself.
Surprisingly enough there was little adverse reaction to this
aside from a few quiet jokes in relation to people wondering how
much $ Drunkfux would be getting from SRI for the tape <G>
Stuart Hauser from SRI, Stanford Research Inst. was the first
speaker of the day, he was (or is) a older looking man who looked
relaxed and confident. He was here to tell us about SRI and their
goals (or he was here to milk the crowd for info, depends who you
talk to I suppose).
SRI is an international corporation, employing over 3000
people, that claims no ties to the Feds, NSA , CIA or any other
government arm interested in harming, persecuting or even
prosecuting the hacker community.
Their main concern is major network security, on a corporate
level. However there was talk of SRI having contract work for
military related arms producers this was not brought up at the
conference.
He started by talking about himself and SRI, he mentioned their
policy and their feelings towards dealing with the hacker
community on a productive level. He went on to confirm, that
someone we all know or know of that works for the same company is an
asshole, and we are not the only community to realize this. I
will leave his name out for reasons of privacy, however a good
hint for those who were not at scon and are reading this his first
name starts with DON.
After allowing us all to laugh this over he went to tell us of
the finding of his teams research form SRI. His team consisted of
himself, Doug Web, and Mudhead, they were tasked to compile a
report on the computer underground in some nebulous fashion, he
was of course (at least to me and everyone I was sitting with)
not very clear with this. To the best of our knowledge the report
was like a damage potential report, ie: How much can the hackers
really do, and HOW much will the hackers do?
Stu conceded that the networks and companies had more to fear
from corporate espionage at the hands of employees and
mismanagement then they did from hackers. However he fears a
new breed of hackers he says are becoming a reality on the nets,
the hacker for cash, digital criminals. He felt that this new
breed of hacker will be counterproductive for the both the PD
world and the underground on the basis that if they destroy it
for the corps, we cannot use it either.
In the way of security Stuart felt the Social engineering was
the biggest weakness of any system, and the most difficult to
defend against. Also he felt too much info about machines and
security of them was public info, also public info was available
for use in social engineering. He felt that the only way to
combat this is to make the employees and owners of companies more
aware of these threats. Beyond the social engineering he feels
that physical measure are too weak at most facilities and do not
protect there hardcopy data well enough he meant this both for
Trashing and actual b&e situations again he felt the situation
was to spread awareness.
While conducting the interviews to for this report Stuart formed
his own opinion of the hacker which he shared with us. He feels
that hackers for the most part are not malicious at all, and are
actually decent members of cyberspace. Moreover he feels that
hackers should be put to work as opposed to put to jail.
Something we all feel strongly about. Stuart finished his speech with
brief allusions to scholarships and upcoming programs, at this point he
left the floor open to questions. The are as follows:
Emmanuel Goldstien: "Earlier you (Stuart) mentioned the existence
of 'malicious hackers', where are they?"
Stu: "Holland, Scandinavia, the UK poses a great threat,
Israel, Australia. The bloc countries for virii and piracy are very
busy right now, We have to wonder what will happen when they get full
access to our nets. What happens when the eastern bloc catches
up?"
Unknown: "Who finances this".
Stuart: "Really that's none of your business" (paraphrased <G>)
Unknown: "Where is the evidence of these so called malicious
hackers, I think the whole malicious hacker idea is spawned by the
media to justify the persecution of hackers".
Stuart: [Has no chance to reply]
Control-C: (interjects) "Punk kids are all over the place doing it
man."
KL: "its common knowledge that it is happening there."
Stu: (offers example) Was told that at three companies have tried
to hire tiger teams, for corporate breaches however he has no proof
of this. Yet he feels the sources were reliable.
Unknown: "I have heard rumors that SRI is writing software to
catch hackers. is this true?"
Stu: Says he hasn't heard about this. However if they are more
interested in what SRI is doing he will be sticking around until
this afternoon or evening. And has about 15 copies of the report that
are available to the public.
Next speaker
[I was out of the room for this speaker and asked Black Kat to
type this in, so your guess is as good as mine.]
Someone showed a DES encryption laptop, 8 months old, with a built in
chip to encrypt everything in and out (modem, disk, etc). Didn't have
an overhead projector but was giving personal demos. Made by BCC
(Beaver Computing Company) out of California. Doesn't advertise, but
will give sales brochures etc, if you call the 800 number.
Thinks the govt is discouraging wide scale distribution.
Count Zero & RDT
Count Zero announced he would be talking on a unique telco
feature they found and about packet radio. Stickers and
board adds from RDT and cDc were handed out at this time.
White Knight and Count0 started by introducing a bizarre
telco feature they came across, and played a tape recording to
demonstrate some of its features to the crowd. After some chatter with
the rest of the con, nothing definite was concluded, however, some
good ideas are brought out. (As well as some insight by folks who have
discovered similar systems.)
Next came some comic relief from Count0 and White Knight in the
way of the termination papers of an employee from a telco, the
employees case report was read to the crowd and essentially painted the
picture of a really disgruntled and ornery operator. Specifics were read,
and people laughed at the shit this guy had gotten away with, end of
story.
Following this Count0 spoke for Brian Oblivion who could not be
there about an American Database/social program called America 2000.
Brian came across this information by the way of a group in Penn state,
the program is meant to monitor the attitudes of students, and how
they behave with within state standards..
Furthermore the Database is compiled without the knowledge or
permission of parents, beyond this the file can stay with a man
or woman for life, in the hands of the state.
Count0 on Packet Radio
Self-empowering Technology
Next came the actual Packet radio discussion, Count0 displayed
his hardware and talked at great length on a whole spectrum of issues
related to the radio packet switching, and some points while straying,
even the morality of the FCC. This went on for quite some time.
Count0 instructed the crowd on the principle behind packet switch
radio as well as explaining which licenses to get and to apply.
Drunkfux, Merchandising
Drunkfux
Drunkfux started by, Merchandising a shitload of ho-ho con
shirts, 15$ a piece as well as mthreat his tonloc shirts, also selling the
mods for the Mistubishi 800, mthreat also had a chip preprogrammed for
the Mits 800 avail. Those who could not get the mod were told to get it
from cypher.com in /pub/vind. He told us of the new Metal Land revival and
said a bit about it.
Next and most interesting was the discussion of the fate of
Louis Cypher, and his companions in the recent bust. It seems Cypher
and ALLEGED accomplices Doc and JP have been charged with numerous
felonies not which the least of is Treasury Fraud and b&e of a federal
post office. Drunkfux went into detail on how they had been turned
on, and essentially entraped into the situation. Also how the media as
per usual had made a witch hunt out of it by connecting Doc to the a
remote relation to the Kennedys etc, etc.
Eric Neilson with CPSR
Eric Nielson started by telling the crowd what had drawn him to
the CPSR, by the way of reading a discussion in congress about a
congressman defending the strength of a Starwars network by stating that the
gov had an excellent example for security: the phone networks in the
USA. Needless to say Eric had little faith in this analogy <G>.
He went on to describe what the CPSR covers and what they have
done recently in the of the clipper debate, Sundevil and other 1st
Amend. issues. He discussed the internal workings of CPSR and its
funding police as well as telling Conf Members how to go about joining.
Erik Bloodaxe
Erik started out with explaining why Phrack 43 is not yet out.
This is due to the fact that Stormking.com will not allow it to be mailed
from it, seeing as the owner does telco consulting and feels it would
be a conflict of interest. Furthermore he won't give the listserve to
the Phrack Staff, making it somewhat difficult to distribute. However KL
is acting as a mediator and hopefully this will be settled soon.
Mindvox was considered but rejected as a choice, for fear of people
getting a hold of the list..
On the issue of Phrack and the copyright, Erik had only ONE fed
register out of all those who collect it. However Phrack has
obtained logs of both CERT forwarding Phrack by mail, as well as Tymnet
obtaining the mag.
Beyond this Agent Steel was discussed in an "I told you so
fashion" it turns out that him being accused of being a narc in the past
were valid, seeing it was proved by way of documentation that Agent
ratted out Kevin Poulsen (Dark Dante) resulting in his current 19
charges.
And of Course the new LOD issue was broached, however very
little was discussed on it and it was simply agreed to a large degree that
Cameron (lord Havoc) must have been seriously abused as a child to
display the type of obvious brain damage he is afflicted with now.
Emmanuel Goldstein 2600
Emmanuel Goldstein in his purple Bellcore shirt discussed with us
his appearance before a Congressional hearing on a panel with Don
Delaney and how the hostility shown towards him by the house
representatives in session. Beyond this he went on to describe several
nasty letter letters sent to him by telcos for PUBLIC info he had posted
in the winter issue of 2600. This is a very brief summary of what he had to
say, mainly due to the fact that I was too busy listening to him to
concentrate my apologies go to those who were interested in
reading the whole thing.
Next up was a lengthy discussion on Novel Software and its
weaknesses, By Erreth Akbe however the speaker he wished me to leave
this out of the transcripts so I will respect his wishes in this.
********End Of Transcript***********
I would like to thank the following for making the Con an
experience for me that I will not soon forget:
Arist0tle, Black Kat, Butler, Control-C, Erreth Akbe, Tommydcat,
the Public and theNot. Thx guys.
Please send all responses to Besaville@acdm.sait.ab.ca
*****************************************************************************
Presenting :::
SummerCon 1993 in Review !!!
Hacking Tales and Exploits by the SotMESC
Additional Activities by the GCMS MechWarriors
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
The weather was right, too right. Something was foul in the
air. It was akin to that mythical 'Calm before the Storm' scenario
that is dreaded by so many. But, Scribbles and I boarded the
Techno-Laden SotMESC compact and took off down the Highway to our
ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!
Instantly, weather was seen brewing in the Caribbean. Hints
of Hurricanes echoed through the towns we drifted through. To
alleviate any anxieties, massive quantities of Jolt! were obtained
in the infamous town of Hatties-Gulch, a small town taken over by
the virulent filth called College Students.
The trip continued, over hill and over dale. Dale was quite
considerate not to press charges. Colleges were passed in a blink
of the eye. Nothing was going to stop us. We were on a mission
from the Church. But, that's another story.
After locating that famous arch, a beeline was made at speeds
over 100 MPH through St. Louis until our destination came into
view: The St. Louis Executive International (800-325-4850). We
came to meet our nemesis and friends at the fest hosted by the
Missouri Programming Institute. Brakes were quickly applied
as the car appeared to be going off the off-ramp and into the ditch.
From the lobby it was obvious, there were unusual people here.
These were the kind of people that you fear your daughters would
never meet. The kind of people that kicked themselves into
caffeine frenzies and would become infatuated with virtual lands.
Yes, these were my kind of people.
Now, the adventure may start . . .
Oh, and in response to A-Gal on pg 30 of 2600, Scribbles
says she's the sexiest hacker on the nets. Hmmmmm, I'm inclined
to agree with that. I'm sure Control-C will agree too, especially
after he trailed her for half of SCon.
Now, we all know that Friday is the warm-up day on what we can
expect to see at SCon during the main Saturday drag. It was no
surprise to find the main junction box rewired, pay-phones providing
free services, rooms rerouted and computers running rampant down the
hallways. But, the traditional trashing of Control-C's room this
early signaled that more would be needed to top the night. The
maid was definitely not pleased.
For a list of those that attended, maybe KL can provide us
with that information. There were too many faces for my fingers
to lap into. And, there were quite a few new faces. I believe
that Weevil was the youngest hacker at 16, and Emmanuel was the
oldest, although he didn't give his age.
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
THE CONFERENCE
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
Let's get to the meat of the matter. The conference had
a nice spacious central area with tables neatly lining alongside
the wall. Between the tables and the walls were many hacks packed
as tightly as they could get. Why didn't we think of moving the tables
closer together ???
KL took control and ran the conference smoothly. dFx panned
everyone on his digital camcorder. Several cameras were around
to provide us with gifs later. And the conference took off . . .
First up was Stuart from SRI (Stanford Research Institute).
He elaborated on SRI's being involved in research, engineering and
design. From studies done around the world with hackers and those
associated, malicious hacking can not be stopped. There is no
evidence, though, that the current hackers are interested in
bringing the networks down at all. Concern was given to new
hackers that may be emerging with financial gain and maliciousness
occurring. The top security hole with system was noted as
being the infamous social engineering technique. SRI did note
that many places did not utilize the security that they even had
in place. It was also noted that laws against malicious hackers,
and probably any hacker, should be fair and just. The most
malicious hacks that are turning up have been spotted in the
following named countries: Holland, Scandinavia countries,
very possibly soon in the UK, Australia, Israel, the former USSR,
and Bulgaria ( noted for virii writers ).
A voice made mention of Operation Rahab, hackers in German Intelligence.
Next up was Count Zero from cDc/RDT to talk about packet
radio. His talk included information about the IESS and handed
out a flyer on America 2000 ( school under 1984 regimes ).
Maybe someone will provide us with a copy of this. A packet
radio modem at 1200 can be obtained easily for $50. TCP/IP
packets are already being send over the bandwidth along with
other network protocols. The usefulness of all this is that
the information is broadcast and it is virgin territory. The
baud limitation is due only based upon the bandwidth you are
operating at and the number of collisions occurring. On a
band you can see every packet that is being transmitted if
you wish. All this is located on a 2 meter band. Currently
the FCC forbids encryptions on the airwaves, although this is
noted as being virtually impossible to enforce. It also takes
5 months to get an amateur radio license, and your personal info
is recorded in a book easily obtained at libraries. The problem
with going around the FCC is that there exist vigilante HAMs that
monitor the bands and have nothing better to do than filter
info and whine to the FCC. Bandwidths are decreasing though.
This is due to an increased interest overall by communications
in these areas. Unless you do something major the FCC will
not give you much interest. The book on preparing yourself for
a Tech Class can be obtained from Radio Shack for $9.
Next up was dFx. He was promoting the HCon and Tone-Loc
t-shirts that were for sale. Merchandising was getting pretty
high. He also gave out a few Mitsubishi 800 disks. He was
also recognized as the ONLY and LAST member of the Neon Knights,
a club that had a wide range of comedy names generated. The
word was put out the HCon '93 will be in December 17-19 with
a hint that it could also wind up being in Austin. Then the
conversation turned to Lord Byron's bust, which we should here
more information on any day this week. The conversation
reiterated the government narc that was at the AA meeting
that was pressuring Byron. Byron was also noted as having
rejected a plea bargain the courts offered him. And lastly,
it is going to happen soon so get them while you can. The
FTP site at eff.org will be dropping its CuD directory due
to a conflict of interest with EFFs major contributors, mainly
the RBOCs and other interest groups that don't like us.
Erik Bloodaxe took the table next to talk about what
was happening with his involvement with Phrack and some
interesting info about Agent Steel. As for Phrack, the
Email list is being with-held by Tuc. The mailing list
has been refused at Mindvox due to files missing mysteriously
at that site. And, no organization registered for Phrack #42
since it was copyrighted with a nice and lengthy preamble,
except for one company from Mitre. Currently Phrack #43 is
in limbo and is estimated at 1 Meg long. Going onto the
info about Agent Steel, basically he's a narc. Lord Havok from
Canada is trying to restart the LOD under some unknown
logical rationale that since LOD is defunct, anyone can
reclaim the name. Lord Havoc, aka Cameron, has been going
around trying to get documentation to put together an LOD
technical journal #5. Supposedly there is a skin-head group
in Canada that in now tracking Cameron down.
Someone came up next [Minor Threat] and gave us an update on
Codec. Two weeks after the last SCon, Codec was pulled over while
on the run from the law for speeding and then arrested for
burglary, resisting arrest, etc . . . He is estimated to
be out of jail in 1995 and still has time to serve in a few
other states. Mail can be sent to him at this address:
codec@cypher.com. Maybe Crunch can give Codec some hints on
how to get by in prison?
From the CPSR, Eric Nielson took the table. He elaborated
on the CPSR and ran a Q&A period. Basically, the CPSR files many
FOIA requests and sues the government. Their focus is on the
workplace computing. Elaboration was given on the Clipper Chip
and computer ship security. The CPSR is staffed with lawyers
and takes their funding from dues and grants. They are not
sponsored by any corporations.
From the far side of the table came the infamous Emmanuel
Goldstein from 2600. He stated how he had testified at congress and
gave them a live demonstration of bandwidth scanning and redboxing.
While he was there, the inquisition started against him on the
issue of 2600. Emmanuel then tried to explain the culture to
our representative that it is bad to classify all hackers as
criminals. Goldstein then went on to talk about the DC 2600 bust
and how it has resulted in 2600 meetings springing up all across
the country. A review of several films on software piracy at
the office, disaster recovery and viruses from Commonwealth
Films was given. And, to highlight everything, 2600 has purchased
an AT&T van that they plan to take to assorted conventions and
start a fleet of these up.
Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:)
Last up was Erreth Akby, a Certified Netware Engineer. He
explained that the only upgrade in Novell 4.0 is the disk compression.
He also informed us that the supervisor and guest accounts generally
have default passwords. TO hack into this Net, you should use a PC
with full alt and functions keys. The supervisor p/w is on the
RConsole in a file called autoexec.mcf on version 3.11. Netcrack
will not work on a system with Intruder Lock-Out. Non-dedicated
netware must boot from a floppy. Best of all, you can dial out
by using cubix-quarts, which are PC with modems on the system.
Below is a quick reprint of a paper that was recovered
from Control-C's trashed room.
Mrs Jasnagan,
I would like to set up a meeting
to discuss Kevin's progress in Social
Studies and English. Please let
me know when it would be
convenient.
Thank you
( Scribble , scribble )
Dear Mr + Mrs Gormby,
We would be happy
to meet with you at
9:30 on Thursday, April
1st in Room 104
Sincerely,
M.Jarnagin
&
S.Dietrich
Now, could this be Kevin Poulson ??? Naaa, no way.
Amazing what technical data trashing will uncover. I guess
I should throw this away now . . .
After the convention, there was much rejoicing. The reasons
would become fairly obvious as a 'swingers party' sign was soon
located outside one of the hotel wings. Yes, it would be a very
good convention.
Several people made their way to the vehicles for a long
night of trashing and raiding of the various FedEx, UPS and
other assorted boxes around town. Other groups made their
way to computers that were trying to connect with anything
they could out in town. There were also those that reluctantly
went to the mall to take advantage of the local population.
What did not happen ??? Control-C did not get laid, but
it was rumored that there were a few 12-year olds wandering
around the hotel looking for this legendary hacker. No deaths
had occured, the fires were kept to a minimum and nothing major
was noted as being broken.
One thing was for sure, there were a lot of alcoholic
beverages going around, walkie-talkies, scanners, and wild
tales. Several area buildings were broken into, but nothing
major was done.
Then the shit hit the fan. It seems several hackers had riled
the swingers into a frenzy. I guess the swingers couldn't swing
with it. What happened ??? Phones went ringing room to room and
radios blared to life that the cops were here !!! At count, there
were 6 cops, 1 sheriff and 4 hotel employees that started patrolling
the hallways. Yes, we were under room arrest at our own convention
in our own wing. Anyone that left there room was told to stay there
or they would be arrested. The cops were very insistent that no
pictures were to be taken. The swingers had broken our balls.
But, this would not stop us. Soon, there was a phone network
going on with radio interfaces. The windows opened and a few migrated
to other locations of the hotel. After a while, the authorities left
feeling satisfied that they had intimidated us. They didn't.
After they left, the hallways erupted again. In the SotMESC
room a gathering turned out to watch several techno-infested
videos. At the cDc room were others viewing the HoHoCon '92 film
that dFx brought down with him. At one point, the microwave
around the lobby was detonated and a mysterious stack of Credit
Card carbons was found. The liberated phones were being
utilized to their full international extent, and several of the
soda machines decided to give out a few free drinks.
But, we couldn't leave well enough alone. Sir Lance went
to the lobby and took a picture of the hotel Asst. Manager.
I guess this guy didn't like his photo being taken, since he
turned around and called the cops on Sir Lance. Down the hallway
the cops came, dragging Sir Lance back with them. In the end,
the cops explained to the Asst. Manager that it was not a crime
in the US to take pictures of people.
In another related story, Kaos Wizard wound up calling the
SotMESC room with a wild plea for help. It seemed he was with
a large group of trashers that included Albatross, Intrepid,
Forced Entry, Zippy, The Public and more. Kaos was at a Central
Office close to the hotel on Woodson and needed help. He had
taken off to take a piss and noticed that the trashers were
surrounded by cops when he returned. There was no way he was going
back with all those cops there ( and, might I mention, there was
also a police dog ). Mystic Moos gathered up a few people and
went to rescue Kaos Wizard as the rest of the trashers returned
to the hotel. It seems they had eluded the cops by telling them
that they were waiting for their friend to return from taking
a bathroom break ( Kaos Wizard ). Unfortunately, he never
returned. The cops let them go eventually. Mystic Moos rescued
Kaos Wizard, and the hotel was aglow in activity again.
Control-C came down the hall at one point to make a startling
discovery. It seems that at a local club there was a band playing
that featured 'Lex Luthor'. The elusive X-LOD founder had been
located. AFter some thought, it was decided he could stay there
and sing the blues while the rest of us partied the night away.
For those interested, the hotel fax is 314-731-3752.
One of the police officers detaining us was S.M. Gibbons.
IBM will send a 36 page fax to the number you give them.
To activate, call 1-800-IBM-4FAX. As you can imagine, it wasn't
long before the hotels fax ran out of thermal paper.
Below is a gathering of Flyers . . .
HoHoCon '92 Product Ordering Information
If you are interested in obtaining either HoHoCon shirts or videos,
please contact us at any of the following:
drunkfux@cypher.com
hohocon@cypher.com
cDc@cypher.com
dfx@nuchat.sccsu.com
359@7354 (WWIV Net)
HoHoCon
1310 Tulane, Box #2
Houston, Tx
77008-4106
713-468-5802 (data)
The shirts are $15 plus $3 shipping ($4 for two shirts). At this
time, they only come in extra large. We may add additional sizes if
there is a demand for them. The front of the shirt has the following
in a white strip across the chest:
I LOVE FEDS
( Where LOVE = a red heart, very similar to the I LOVE NY logo )
And this on the back:
dFx & cDc Present
HoHoCon '92
December 18-20
Allen Park Inn
Houston, Texas
There is another version of the shirt available with the following:
I LOVE WAREZ
The video includes footage from all three days, is six hours long and
costs $18 plus $3 shipping ($4 if purchasing another item also).
Please note that if you are purchasing multiple items, you only need
to pay one shipping charge of $4, not a charge for each item. If
you wish to send an order in now, make all checks or money orders
payable to O.I.S., include your phone number and mail it to the street
address listed above. Allow a few weeks for arrival.
Thanks to everyone who attended and supported HoHoCon '92. Mail us if
you wish to be an early addition to the HoHoCon '93 (December 17-19)
mailing list.
Calvary Black Crawling Systems
617-267-2732 617-482-6356
ATDT EAST
617-350-STIF
DemOnseed sez: "Call ATDT East or I'll crush your skull"
Home of -= RDT...
Trailings to follow . . . Slug, slug, slugfest . . .
Join the ranks of the Cons: HoHoCon, MardiCon, SummerCon !!!
****************************************************************************
Top 25 Things I Learned at SummerCon '93
--------------------------------
By Darkangel
SummerCon is a place where many hackers from all over the
world meet to discuss the current state of hacking today, and to
drink themselves under the table. Every year, pages and pages of
useful information is passed and traded among the participants.
In this brief summery, I will attempt to point out the things
that I learned and I thought were the most helpful to the whole
hacker community. I hope you enjoy it.
#1) DON'T let Control-C within 15 feet of any person that
does not have a penis.
#2) Knight Lightning will have a stroke before the age of
30.
#3) French Canadians ALWAYS sound drunk.
#4) Loops do not make good pickup lines.
#5) The Zenith is outside the window. Just look up.
#6) Smoking certain herbs is still illegal in St. Louis.
#7) If you see a taxi and think it might be a cop, it
probably is.
#8) Hotel Security is worse than Mall Security.
#9) The payphones in the lobby are not meant to be free.
#10) Do not climb through the ceiling to get to the room
with the PBX in it.
#11) Do not glue the locks shut on an entire floor of the
hotel. (especially when people are in them)
#12) This machine is broken.
#13) Do not dump bags you got trashing on the floor of
someone else's room.
#14) St. Louis police do not appreciate the finer points of
Simplex lock hacking.
#15) VaxBuster should never be allowed to drink Everclear.
#16) Scribbles has a very nice ass.
#17) Do not photograph Pakistani hotel security guards.
#18) Do not try to bring a six pack through customs.
#19) Loki is the Fakemail God.
#20) Do not rip the phone boxes out of the walls and cut
the wires.
#21) Barbie Doll pornos can be cool.
#22) Frosty can do weird things with techno and movies.
#23) Always remove the mirrors from the walls to check for
hidden cameras.
#24) Do not threaten or harass other people staying at the
same hotel. This can be bad.
#25) I really don't think the hotel will let us come back.
That wraps it up! See you at HoHoCon!
-Darkangel
***************************************************************************
Hack-Tic Presents
H A C K I N G
at the E N D of the
U N I V E R S E
1993 SUMMER CONGRESS, THE NETHERLANDS
=========================================================================
HEU?
Remember the Galactic Hacker Party back in 1989? Ever wondered what
happened to the people behind it? We sold out to big business, you
think. Think again, we're back!
That's right. On august 4th, 5th and 6th 1993, we're organizing a
three-day summer congress for hackers, phone phreaks, programmers,
computer haters, data travellers, electro-wizards, networkers, hardware
freaks, techno-anarchists, communications junkies, cyberpunks, system
managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
dudes, law enforcement officers (appropriate undercover dress required),
guerilla heating engineers and other assorted bald, long-haired and/or
unshaven scum. And all this in the middle of nowhere (well, the middle
of Holland, actually, but that's the same thing) at the Larserbos
campground four meters below sea level.
The three days will be filled with lectures, discussions and workshops
on hacking, phreaking, people's networks, Unix security risks, virtual
reality, semafun, social engineering, magstrips, lockpicking,
viruses, paranoia, legal sanctions against hacking in Holland and
elsewhere and much, much more. English will be the lingua franca for
this event, although one or two workshops may take place in Dutch.
There will be an Internet connection, an intertent ethernet and social
interaction (both electronic and live). Included in the price are four
nights in your own tent. Also included are inspiration, transpiration, a
shortage of showers (but a lake to swim in), good weather (guaranteed by
god), campfires and plenty of wide open space and fresh air. All of this
for only 100 dutch guilders (currently around US$70).
We will also arrange for the availability of food, drink and smokes of
assorted types, but this is not included in the price. Our bar will be
open 24 hours a day, as well as a guarded depository for valuables
(like laptops, cameras etc.). You may even get your stuff back! For
people with no tent or air mattress: you can buy a tent through us for
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
(that's five p.m. for analogue types) on August 3rd. We don't have to
vacate the premises until 12:00 noon on Saturday, August 7 so you can
even try to sleep through the devastating Party at the End of Time
(PET) on the closing night (live music provided). We will arrange for
shuttle buses to and from train stations in the vicinity.
HOW?
Payment: in advance please. Un-organized, poor techno-freaks like us
would like to get to the Bahamas at least once. We can only guarantee
you a place if you pay before Friday June 25th, 1993. If you live in
Holland, just transfer fl. 100 to giro 6065765 (Hack-Tic) and mention
'HEU' and your name. If you're in Germany, pay DM 100,- to Hack-Tic,
Konto 2136638, Sparkasse Bielefeld, BLZ 48050161. If you live elsewhere:
call, fax or e-mail us for the best way to get the money to us from your
country. We accept American Express, we do NOT cash ANY foreign cheques.
HA!
Very Important: Bring many guitars and laptops.
ME?
Yes, you! Busloads of alternative techno-freaks from all over the
planet will descend on this event. You wouldn't want to miss that,
now, would you?
Maybe you are part of that select group that has something special to
offer! Participating in 'Hacking at the End of the Universe' is
exciting, but organizing your very own part of it is even more fun. We
already have a load of interesting workshops and lectures scheduled,
but we're always on the lookout for more. We're also still in the
market for people who want to help us organize during the congress.
In whatever way you wish to participate, call, write, e-mail or fax us
soon, and make sure your money gets here on time. Space is limited.
SO:
- 4th, 5th and 6th of August
- Hacking at the End of the Universe
(a hacker summer congress)
- ANWB groepsterrein Larserbos
Zeebiesweg 47
8219 PT Lelystad
The Netherlands
- Cost: fl. 100,- (+/- 70 US$) per person
(including 4 nights in your own tent)
MORE INFO:
Hack-Tic
Postbus 22953
1100 DL Amsterdam
The Netherlands
tel : +31 20 6001480
fax : +31 20 6900968
E-mail : heu@hacktic.nl
VIRUS:
If you know a forum or network that you feel this message belongs on,
by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
WP.BAT, you name it. Spread the worm, uh, word.
=========================================================================
SCHEDULE
day 0 August 3rd, 1993
=====
16:00 You are welcome to set up your tent
19:00 Improvised Dinner
day 1 August 4th, 1993
=====
11:00-12:00 Opening ceremony
12:00-13:30 Workshops
14:00-15:30 Workshops
15:30-19:00 'Networking for the Masses' 16:00-18:00 Workshops
19:00-21:00 Dinner
21:30-23:00 Workshops
day 2 August 5th, 1993
=====
11:30-13:00 Workshops
14:00-17:00 Phreaking the Phone 14:00-17:00 Workshops
17:30-19:00 Workshops
19:00-21:00 Dinner
day 3 August 6th, 1993
=====
11:30-13:00 Workshops
14:00-18:00 Hacking (and) The Law 14:00-17:00 Workshops
18:00-19:00 Closing ceremony
19:00-21:00 Barbeque
21:00-??:?? Party at the End of Time (Live Music)
day 4 August 7th, 1993
=====
12:00 All good things come to an end
=========================================================================
'Networking for the masses', Wednesday August 4th 1993, 15:30
One of the main discussions at the 1989 Galactic Hacker Party focused on
whether or not the alternative community should use computer networking.
Many people felt a resentment against using a 'tool of oppression' for
their own purposes. Computer technology was, in the eyes of many,
something to be smashed rather than used.
Times have changed. Many who were violently opposed to using computers
in 1989 have since discovered word-processing and desktop publishing.
Even the most radical groups have replaced typewriters with PCs. The
'computer networking revolution' has begun to affect the alternative
community.
Not all is well: many obstacles stand in the way of the 'free flow of
information.' Groups with access to information pay such high prices for
it that they are forced to sell information they'd prefer to pass on for
free. Some low-cost alternative networks have completely lost their
democratic structure. Is this the era of the digital dictator, or are we
moving towards digital democracy?
To discuss these and other issues, we've invited the following people
who are active in the field of computer networking: [Electronic mail
addresses for each of the participants are shown in brackets.]
Ted Lindgreen (ted@nluug.nl) is managing director of nlnet. Nlnet is the
largest commercial TCP/IP and UUCP network provider in the Netherlands.
Peter van der Pouw Kraan (peter@hacktic.nl) was actively involved in the
squat-movement newsletters 'Bluf!' and 'NN' and has outspoken ideas
about technology and its relation to society. Had a PC all the way back
in 1985!
Maja van der Velden (maja@agenda.hacktic.nl) is from the Agenda
Foundation which sets up and supports communication and information
projects.
Joost Flint (joost@aps.hacktic.nl) is from the Activist Press Service.
APS has a bbs and works to get alternative-media and pressure groups
online.
Felipe Rodriquez (nonsenso@utopia.hacktic.nl) is from the Hack-Tic
Network which grew out of the Dutch computer underground and currently
connects thousands of people to the global Internet.
Andre Blum (zabkar@roana.hacktic.nl), is an expert in the field of
wireless communications.
Eelco de Graaff (Eelco.de.Graaff@p5.f1.n281.z2.fidonet.org) is the
nethost of net 281 of FidoNet, EchoMail troubleshooter, and one of the
founders of the Dutch Fidonet Foundation.
Michael Polman (michael@antenna.nl) of the Antenna foundation is a
consultant in the field of international networking. He specialises in
non-governmental networks in the South.
Alfred Heitink (alfred@antenna.nl) is a social scientist specializing in
the field of computer-mediated communication as well as system manager at
the Dutch Antenna host.
Rena Tangens (rena@bionic.zer.de), was involved in the creation of the
Bionic Mailbox in Bielefeld (Germany) and the Zerberus mailbox network.
She is an artist and wants to combine art and technology.
The discussion will be led by freelance radiomaker and science
journalist Herbert Blankesteyn. He was involved in the 'Archie'
children's bbs of the Dutch VPRO broadcasting corporation.
=========================================================================
'Phreaking the Phone', Thursday August 5th 1993, 14:00
Your own telephone may have possibilities you never dreamed possible.
Many years ago people discovered that one could fool the telephone
network into thinking you were part of the network and not just a
customer. As a result, one could make strange and sometimes free
phonecalls to anywhere on the planet. A subculture quickly formed.
The phone companies got wise and made a lot of things (nearly)
impossible. What is still possible today? What is still legal today?
What can they do about it? What are they doing about it?
Billsf (bill@tech.hacktic.nl) and M. Tillman, a few of the worlds best
phreaks, will introduce the audience to this new world. Phone phreaks
from many different countries will exchange stories of success and
defeat. Your life may never be the same.
=========================================================================
'Hacking (and) The Law', Friday August 6th, 14:00
You can use your own computer and modem to access some big computer
system at a university without the people owning that computer knowing
about it. For years this activity was more or less legal in Holland: if
you were just looking around on the Internet and didn't break anything
nobody really cared too much...
That is, until shortly before the new computer crime law went into
effect. Suddenly computer hackers were portrayed as evil 'crashers'
intent on destroying systems or, at least, looking into everyone's
files.
The supporters of the new law said that it was about time something was
done about it. Critics of the law say it's like hunting mosquitoes with
a machine-gun. They claim the aforementioned type of hacking is not the
real problem and that the law is excessively harsh.
To discuss these issues we've invited a panel of experts, some of whom
are, or have been, in touch with the law in one way or another.
Harry Onderwater (fridge@cri.hacktic.nl), is technical EDP auditor at the
Dutch National Criminal Intelligence Service (CRI) and is responsible for
combatting computer crime in the Netherlands. He says he's willing to
arrest hackers if that is what it takes to make computer systems secure.
Prof. Dr. I.S. (Bob) Herschberg (herschbe@dutiws.twi.tudelft.nl), gained
a hacker's control over his first system 21 years ago and never ceased
the good work. Now lecturing, teaching and publishing on computer
insecurity and imprivacy at the technical university in Delft. His
thesis: 'penetrating a system is not perpetrating a crime'.
Ronald 'RGB' O. (rgb@utopia.hacktic.nl) has the distinction of being the
only Dutch hacker arrested before and after the new law went into effect.
He is a self-taught UNIX security expert and a writer for Hack-Tic
Magazine.
Ruud Wiggers (ruudw@cs.vu.nl), system manager at the Free University
(VU) in Amsterdam, has for 10 years been trying to plug holes in system
security. He was involved in the RGB arrest.
Andy Mueller-Maguhn (andy@cccbln.ccc.de) is from the Chaos Computer Club
in Germany.
Eric Corley (emmanuel@eff.org) a.k.a. Emmanuel Goldstein is editor
of the hacker publication '2600 magazine'. The first person to realize
the huge implications of the government crackdown on hackers in the US.
Winn Schwartau (wschwartau@mcimail.com) is a commercial computer
security advisor as well as the author of the book 'Terminal
Compromise'. His new book entitled 'Information Warfare' has just been
released.
Ray Kaplan (kaplan@bpa.arizona.edu) is a computer security consultant.
He is constantly trying to bridge the gap between hackers and the
computer industry. He organizes 'meet the enemy' sessions where system
managers can teleconference with hackers.
Wietse Venema (wietse@wzv.win.tue.nl) is a systems expert at the
Technical University in Eindhoven. He is the author of some very well
known utilities to monitor hacking on unix systems. He has a healthy
suspicion of anything technical.
Peter Klerks (klerks@rulfsw.leidenuniv.nl) is a scientist at the centre
for the study of social antagonism at the Leiden University. He has
studied the Dutch police force extensively, and is author of the book
'Counterterrorism in the Netherlands.'
Don Stikvoort (stikvoort@surfnet.nl), one of the computer security
experts for the Dutch Academic Society and chairman of CERT-NL (Computer
Emergency Response Team). He is also actively involved in SURFnet
network management.
Rop Gonggrijp (rop@hacktic.nl) was involved in some of the first
computer break-ins in the Netherlands during the 80's and is now editor
of Hack-Tic Magazine.
The discussion will be led by Francisco van Jole (fvjole@hacktic.nl),
journalist for 'De Volkskrant'.
=========================================================================
WORKSHOPS
HEUnet introduction
an introduction to the Hacking at the End of the Universe network.
Jumpstart to VR, 3D world-building on PC's
Marc Bennett, editor of Black Ice magazine, will explain how to
design worlds on your own PC which can be used in Virtual Reality
systems.
Replacing MS/DOS, Running UNIX on your own PC
People who are already running unix on their PCs will tell you what
unix has to offer and they'll talk about the different flavours in
cheap or free unix software available.
Unix security
RGB and fidelio have probably created more jobs in the unix security
business than the rest of the world put together. They'll talk about
some of the ins and outs of unix security.
E-mail networking
Should we destroy X400 or shall we let it destroy itself?
'User Authorization Failure'
A quick introduction to the VAX/VMS Operating System for those that
consider a career in VMS security.
'The right to keep a secret'
Encryption offers you the chance to really keep a secret, and
governments know it. They want you to use locks that they have the
key to. The fight is on!
'Virus about to destroy the earth!'. Don't believe the hype!
What is the real threat of computer viruses? What technical
possibilities are there? Are we being tricked by a fear-machine that
runs on the money spent on anti-virus software?
'It came out of the sky'
'Receiving pager information and what not to do with it'. Information
to pagers is sent through the air without encryption. Rop Gonggrijp
and Bill Squire demonstrate a receiver that picks it all up and
present some spooky scenarios describing what one could do with all
that information.
Cellular phones and cordless phones
How do these systems work, what frequencies do they use, and what are
the differences between different systems world-wide?
Zen and the art of lock-picking.
In this workshop The Key will let you play with cylinder locks of all
types and tell you of ingenious ways to open them.
"Doesn't mean they're not after you"
The secret services and other paranoia.
Audio Adventures
Steffen Wernery and Tim Pritlove talk about adventure games that you
play using a Touch Tone telephone.
Botanical Hacking (THC++)
Using computers, modems and other high tech to grow.
Wireless LAN (Data Radio)
How high a data rate can you pump through the air, and what is still
legal?
Social Engineering
The Dude, well known from his articles in Hack-Tic, will teach you
the basics of social engineering, the skill of manipulating people
within bureaucracies.
'Hacking Plastic'
Tim and Billsf talk about the security risks in chip-cards, magnetic
cards, credit cards and the like.
Antenna Host Demo
The Antenna Foundation is setting up and supporting computer
networks, mainly in the South. They are operating a host system in
Nijmegen, The Netherlands, and they will demonstrate it in this
workshop, and talk about their activities.
APS Demo
APS (Activist Press Service) is operating a bbs in Amsterdam, The
Netherlands. You'll see it and will be able to play with it
'hands-on'.
'Hocking the arts'
Benten and Marc Marc are computer artists. They present some of their
work under the motto: Hocking the arts, demystifying without losing
its magic contents.
Public Unix Demo
Demonstrating the Hack-Tic xs4all public unix, as well as other
public unix systems.
Packet Radio Demo
Showing the possibilities of existing radio amateur packet radio
equipment to transport packets of data over the airwaves.
=========================================================================
COMPUTERS AT 'HACKING AT THE END OF THE UNIVERSE'
This will get a little technical for those who want to know what we're
going to set up. If you don't know much about computers, just bring
whatever you have and we'll see how and if we can hook it up.
We're going to have ethernet connected to Internet (TCP/IP). You can
connect by sitting down at one of our PC's or terminals, by hooking up
your own equipment (we have a depository, so don't worry about theft),
or by using one of our 'printerport <--> ethernet' adapters and
hooking up laptops and notebooks that way. There may be a small fee
involved here, we don't know what they're going to cost us. Contact us
for details, also if you have a few of these adapters lying around.
There might also be serial ports you can connect to using a nullmodem
cable.
You can log in to our UNIX system(s) and send and receive mail and
UseNet news that way. Every participant that wants one can get her/his
own IP number to use worldwide. Users of the network are urged to make
whatever files they have on their systems available to others over the
ethernet. Bring anything that has a power cord or batteries and let's
network it!
=========================================================================
--
Hstorm ++31 2230 60551
Ad Timmering <north@hstorm.hacktic.nl>